Publications
Export 367 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is L [Clear All Filters]
2006. A sensory grammar for inferring behaviors in sensor networks. Proceedings of the 5th international conference on Information processing in sensor networks. :251-259.
2008. Canny edge detection on NVIDIA CUDA. Computer Vision and Pattern Recognition Workshops, 2008. CVPRW '08. IEEE Computer Society Conference on. :1-8.
2008. Mpeg recompression detection based on block artifacts. Proc. of SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents. 6819
2012. Sub-cellular feature detection and automated extraction of collocalized actin and myosin regions. the 2nd ACM SIGHIT symposiumProceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12. :399.
2006. SOFTCBIR: Object Searching in Videos Combining Keypoint Matching and Graduated Assignment. LAMP-TR-132,CAR-TR-1013,CS-TR-4804,UMIACS-TR-2006-25
2011. EFFICIENT PARALLEL NON-NEGATIVE LEAST SQUARES ON MULTI-CORE ARCHITECTURES. SIAM Journal on Scientific Computing. 33(5):2848-2863.
2004. Shot boundary detection based on Image correlation features in video. TREC-VID: Text Retrieval and Evaluation Conference.
2010. The effect of packet loss on redundancy elimination in cellular wireless networks. Proceedings of the 10th annual conference on Internet measurement. :294-300.
2009. Symbiotic relationships in internet routing overlays. Proceedings of the 6th USENIX symposium on Networked systems design and implementation. :467-480.
2010. Don't love thy nearest neighbor. Proceedings of the 9th international conference on Peer-to-peer systems. :5-5.
2009. Triangle Inequality and Routing Policy Violations in the Internet. Passive and Active Network MeasurementPassive and Active Network Measurement. 5448:45-54.
2008. Measurement Manipulation and Space Selection in Network Coordinates. Distributed Computing Systems, International Conference on. :361-368.
2009. Triangle inequality variations in the internet. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. :177-183.
2006. Decentralized message ordering for publish/subscribe systems. Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware. :162-179.
2007. PeerWise discovery and negotiation of faster paths. Proc. Workshop on Hot Topics in Networks (HotNets).
2012. #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
1999. A comparative study of the backbone dynamics of two closely related lipid binding proteins: Bovine heart fatty acid binding protein and porcine ileal lipid binding protein. Molecular and Cellular Biochemistry. 192(1):109-121.
2009. Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
2011. Seam carving estimation using forensic hash. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security. :9-14.
2010. Forensic hash for multimedia information. SPIE Media Forensics and Security. :7541–0Y-7541–0Y.
2009. Enabling search over encrypted multimedia databases. SPIE/IS&T Media Forensics and Security. :7254-18.
2010. Security analysis for privacy preserving search of multimedia. Image Processing (ICIP). :26-29.